Author:
Tyagi Vicky,Saraswat Amar,Kumar Ashwani,Gambhir Shalini
Reference30 articles.
1. Authentication Protocol for an IoT-Enabled LTE Network
2. Internet of Things (IoT): An overview of applications and security issues regarding implementation;Tahir H.;Int. J. Multidiscip. Sci. Eng,2016
3. Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks;Abomhara M.;Journal of Cyber Security and Mobility,2015
4. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
5. A review on lightweight cryptography algorithms for data security and authentication in IoTs